Intelligent CISO Issue 28 | Page 64

BUSINESS SURVEILLANCE allowing bad actors to access networks or to directly infect them with malware. Evolving threats As the pandemic and the response to it has evolved, so have cybercriminals’ strategies and attacks. The scams change to match what people are talking about. Many of the first phishing attacks impersonated specialists from Wuhan, China. Criminals then masqueraded as regional authorities and later, businesses communicating with their employees. In the Middle East, many businesses and authorities have had to warn customers and residents of fake emails being sent out in their name. Some regional airlines shared warnings about malicious emails offering them refunds on cancelled flights. Links were used to capture credentials, allowing bad actors to access networks or to directly infect them with malware. On our own grid, our Threat Intelligence team discovered a phishing scam offering an immediate air ticket refund in exchange for credit card details. The Central Bank of UAE released an announcement at the end of March, saying: “Fraudsters always look for opportunities to target consumers, and as the public is engaged with COVID-19 pandemic news, they are using different tactics to increase fraudulent activities on banking customers.” The most popular COVID-19 phishing scam themes seen by the Mimecast Threat Intelligence team include: COVID-19 policy updates – Emails designed to look like they’re from HR departments, directing employees to ‘login’ and read updated business policies regarding the pandemic and working from home. Coronavirus testing – Offering DIY kits, which take victims to fake sites where they capture their credit card data. Virus updates from healthcare authorities – With fake links to the Centres for Disease Control and Prevention (CDC) and World Health Organisation (WHO). 64 Issue 28 | www.intelligentciso.com